A survey of intrusion detection techniques for cyber-physical systems

R Mitchell, IR Chen - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of
Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As …

A survey of intrusion detection in wireless network applications

R Mitchell, R Chen - Computer Communications, 2014 - Elsevier
Abstract Information systems are becoming more integrated into our lives. As this integration
deepens, the importance of securing these systems increases. Because of lower installation …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[HTML][HTML] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

B Subba, S Biswas, S Karmakar - Engineering Science and Technology, an …, 2016 - Elsevier
Abstract Present Intrusion Detection Systems (IDSs) for MANETs require continuous
monitoring which leads to rapid depletion of a node's battery life. To address this issue, we …

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method

Y Hu, H Li, TH Luan, A Yang, L Sun, Z Wang… - Future Generation …, 2020 - Elsevier
Abstract The modern Industrial Control Systems (ICS) now exhibit an increasing connectivity
to the corporate Internet Technology (IT) networks so as to make use of the rich resources in …

An efficient ids using hybrid magnetic swarm optimization in wanets

AS Sadiq, B Alkazemi, S Mirjalili, N Ahmed… - IEEE …, 2018 - ieeexplore.ieee.org
Sophisticated Intrusion attacks against various types of networks are ever increasing today
with the exploitation of modern technologies which often severely affect wireless networks …

Profiling and mitigating brute force attack in home wireless LAN

MYM Hafiz, FHM Ali - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Brute force is another dangerous type of cyber attack meant for cracking wireless LAN
WPA/WPA2 password. It preludes with several other attacks' attempts namely …

Intrusion Detection System in Self-Organizing Networks: A Survey

R Abdulhammed, M Faezipour… - Intrusion Detection and …, 2017 - api.taylorfrancis.com
An intrusion detection system (IDS) can be defined as the process of detecting and
identifying the nonpermitted access to the services, activities, system information, and …

An intrusion detection system for cluster based wireless sensor networks

X Deng - 2013 16th International Symposium on Wireless …, 2013 - ieeexplore.ieee.org
Dramatic advances in wireless sensor networks (WSNs) are paving the way for it's widely
application. However, security issues have emerged. Compared with the general network …

Design and analysis of intrusion detection protocols in cyber physical systems

RR Mitchel III - 2013 - vtechworks.lib.vt.edu
Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems Page 1 Design
and Analysis of Intrusion Detection Protocols in Cyber Physical Systems Robert R. Mitchell III …